General

  • Target

    eb3a65f7b63d3c9188ee6e97d3dcf6dec8b7d0106863f9be1f49134ea93d3778.exe

  • Size

    214KB

  • Sample

    221220-bblkdage27

  • MD5

    75b39904926eae4df74d119d60804a97

  • SHA1

    4cd62022d731ff34776b645357f2059feea3d6bd

  • SHA256

    eb3a65f7b63d3c9188ee6e97d3dcf6dec8b7d0106863f9be1f49134ea93d3778

  • SHA512

    29fe674aa04db24a019d0cfbf37880bc3c0b7e37aad4a08dd2e0502989351d725b3fccefb5a16827f3b8b127d0c52b8089ecd4234e6f6dc8692d3dcff3316432

  • SSDEEP

    3072:y+iX5QL8qNDhx5Rx8rL7QWJ51R28wRRKCXwGNRAtOba+e9NNjjcbImdzmuX:liXiL86Dh78rHdJs1KCXwG0tNxjcbXF

Malware Config

Extracted

Family

tofsee

C2

svartalfheim.top

jotunheim.name

Targets

    • Target

      eb3a65f7b63d3c9188ee6e97d3dcf6dec8b7d0106863f9be1f49134ea93d3778.exe

    • Size

      214KB

    • MD5

      75b39904926eae4df74d119d60804a97

    • SHA1

      4cd62022d731ff34776b645357f2059feea3d6bd

    • SHA256

      eb3a65f7b63d3c9188ee6e97d3dcf6dec8b7d0106863f9be1f49134ea93d3778

    • SHA512

      29fe674aa04db24a019d0cfbf37880bc3c0b7e37aad4a08dd2e0502989351d725b3fccefb5a16827f3b8b127d0c52b8089ecd4234e6f6dc8692d3dcff3316432

    • SSDEEP

      3072:y+iX5QL8qNDhx5Rx8rL7QWJ51R28wRRKCXwGNRAtOba+e9NNjjcbImdzmuX:liXiL86Dh78rHdJs1KCXwG0tNxjcbXF

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Windows security bypass

    • xmrig

      XMRig is a high performance, open source, cross platform CPU/GPU miner.

    • XMRig Miner payload

    • Creates new service(s)

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks